Technical Summary
This document describes challenges associated with securing smart object
devices in constrained implementations and environments. It includes a
number of guidelines for implementers to use proper security protocols and
tradeoffs needed for certain applications, all steming from the hands-on experiences.
Working Group Summary
This document has been well received by the working group. During the first WGLC in Feb., 2017,
a well-known security expert has provided thorough review and comments which prosponed the shepherd to IESG, but it
helped the document mature better. It was WGLCed again in July of 2017, the consensus of which has been confirmed.
Document Quality
The authors of the document wrote this document based on their hands-on
experience. There is already running code to back this up.
Hannes Tschofenig, as a security expert, has provided a thorough review of a early version.
The most updated version has reflected his comments.
Personnel
Zhen Cao is the document shepherd. Suresh Krishnan is the responsible AD.